Educause Security Discussion mailing list archives
Re: Cyber-Bullying
From: "Gioia, Matthew P." <MGioia () STLCC EDU>
Date: Thu, 30 Aug 2012 10:57:59 -0500
Agreed. Just because it can be done on a computer/electronic device doesn't make it an IT problem. The same thing applies to "time stealing" and IP issues around online course materials. Generally everyone already has policies around undesirable behavior, IP created by staff and misuse of organizational time. Not that IT doesn't have a role to play - we do - but use of technology does not mean the responsibility for creating and policing these policies shifts from leadership/management/supervisors to IT staff. Regards, Matthew Gioia Network Security Analyst Technology and Educational Support Services St. Louis Community College -----Original Message----- From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Mike Porter Sent: Thursday, August 30, 2012 10:29 AM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: Re: [SECURITY] Cyber-Bullying On Thu, 30 Aug 2012, Daniel Bennett wrote:
Harassment (both sexual and non-sexual), Bullying, and Discrimination
are all different. Bullying is often thought of as a k-12 issue with children.
I am thinking that the "cyber" part should be mentioned within an IT
policy (AUP maybe). What's the difference between an abusive email and an abusive letter taped to a dorm door? I think the more we try to write specfic policies targetted at computing, we in fact open the door for more abuse because we implicity accept that certain modes of online behavior can be acceptable where a similar action would not be acceptabe in real-life. Mike Mike Porter Systems Programmer V IT/NSS University of Delaware
From: The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Roger A Safian
Sent: Thursday, August 30, 2012 9:28 AM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: Re: [SECURITY] Cyber-Bullying Can't you use your non cyber policies? Harassment is harassment...why
would the method be a distinguishable factor that would make it allowable in one format when it would not be allowed in another?
From: The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU]<mailto:[mailto:SECURITY@LISTSERV .EDUCAUSE.EDU]> On Behalf Of Daniel Bennett
Sent: Thursday, August 30, 2012 8:23 AM To:
SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU>
Subject: [SECURITY] Cyber-Bullying Hello All, Does anyone have a specific policy or specifically mention
Cyber-Bullying in their policies? IT Policies or otherwise?
Thanks, Daniel Bennett IT Security Analyst Adjunct Faculty Vice-Chair North Central PA Members Alliance Pennsylvania College of Technology One College Ave Williamsport, PA 17701 P:570.329.4989 E:dbennett () pct edu ITS and Penn College will never solicit you for your username or
password in an e-mail.
- Mike Porter PGP Fingerprint: F4 AE E1 9F 67 F7 DA EA 2F D2 37 F3 99 ED D1 C2
Current thread:
- Cyber-Bullying Daniel Bennett (Aug 30)
- Re: Cyber-Bullying Roger A Safian (Aug 30)
- Re: Cyber-Bullying Dan Sarazen (Aug 30)
- Re: Cyber-Bullying Daniel Bennett (Aug 30)
- Re: Cyber-Bullying Mike Porter (Aug 30)
- Re: Cyber-Bullying Gioia, Matthew P. (Aug 30)
- Re: Cyber-Bullying Shamblin, Quinn (Aug 30)
- Re: Cyber-Bullying Roger A Safian (Aug 30)